1 of 44

False-name Attacks under Uncertainty�In Voting Games and Combinatorial Auctions

EconCS Seminar, Hebrew University, July 2024

Yotam Gafni

Weizmann Institute

Moshe Tennenholtz

Ron Lavi

Based on my PhD work with my advisors:

2 of 44

What are False-name Attacks?

  •  

3 of 44

Too ominous to deal with?

Many negative results in different settings:

  • No combinatorial auction is Sybil-proof and Pareto-efficient [Yokoo, Saburai & Matsubara 2004]
  • A Sybil-proof combinatorial auction with m items is O(1/m) efficient, even if all bidders are single-minded and we are not limited computationally [Iwasaki et. al 2010]
  • A Sybil-proof mechanism for Multi-level marketing has o(1) revenue [Emek et. al 2011]
  • Exponentially bad efficiency in resource-sharing games [Mazorra & Della Penna 2023]
  • In false-name proof voting with m alternatives, even if all voters vote for alternative a, it can win w.p. O(1/m) [Conitzer 2008]

4 of 44

A Model of Weighted Voting Games (WVGs)

  •  

5 of 44

Sybil Attacks in Weighted Voting Games

  •  

6 of 44

7 of 44

8 of 44

Past Results for This Model and Related Work

  • Square root seat assignment [Penrose ‘46]
  • “Double” square root (choosing the threshold) [Slomczynski and Zyczkowski ‘06, ‘07]
  • “Quota games” [Zick, Skopalik, and Elkind ‘11, Oren, Filmus, Zick, and Bachrach ’14, …]
  • “P-power”: The ability to extract rent or bribes, as measured by a power index [Felsenthal & Machover ’05, Young ‘78]

  • First work to study Sybil attacks in WVGs: [Aziz, Bachrach, Elkind & Paterson ‘11]
  • Upper and lower bounds for a single agent to split her vote into two parts (Shapley-Shubik and Banzhaf)
  • NP-hard to determine the gain from splitting the vote into two equal parts (both indices, reduction from partition)
  • PP-complete [Faliszewski & Hemaspaandra ‘09, Rey & Rothe ‘14]

9 of 44

Our Goal

  •  

10 of 44

Spoiler: We can guarantee something, for some indices…

Index

Notation

Lower Bound

Tight?

Shapley-Shubik

Yes

Banzhaf

Yes

Deegan-Packel

As a numerical example:

  • If the small players sum up to 70% of total votes, under Shapley-Shubik they are guaranteed 40% of the power even with arbitrary Sybil attacks.
  • If the small players sum up to 90% of total votes, under Shapley-Shubik they are guaranteed 80% of the power even with arbitrary Sybil attacks.
  • If the small players sum up to 30% of total votes, under Shapley-Shubik, …

11 of 44

It will be more convenient to talk about Big players bounds

 

12 of 44

So, Recap:

 

13 of 44

This Goes Back At Least to the 18th Century…

“The number of delegates ought not to be in exact proportion to the number of inhabitants, because the influence and power of those states whose delegates are numerous, will be greater [even relative to their proportion] when compared to the influence and power of the other states...”

(Luther Martin, The Anti-Federalist Papers)

14 of 44

Let’s see some examples

  •  

15 of 44

Power and proportion may not coincide II…

  •  

16 of 44

Time for Proofs!

17 of 44

Shapley-Shubik – It’s just induction

 

 

18 of 44

Some useful definitions and arithmetics…

 

 

19 of 44

Some justified simplifying assumptions…

 

20 of 44

Now we just do the induction over T

 

21 of 44

What’s Wrong with Banzhaf?

 

22 of 44

What’s Wrong with Banzhaf?

 

23 of 44

Deegan-Packel – Separate to Two Regimes

 

24 of 44

The example is the same as for Shapley

  •  

25 of 44

 

 

26 of 44

 

In the high-threshold regime, in any coalition the big players can not be ‘too many’ of this coalition.

In the low-threshold regime, there must be at least twice as many pure small player coalitions than ones that contain big players, because we are on the ‘lower side’ of the binomial (and big players push us even lower).

27 of 44

What’s next?

 

28 of 44

For the math folks in the crowd…

29 of 44

Reminder: VCG & Combinatorial Auctions

 

30 of 44

Example: Two Items and Two Bidders

v1({b}) = v1({a}) = 0, v1({a,b}) = 15

v2({b}) = 10, v2({a}) = 10, v2({a,b}) = 10

VCG allocates 𝒂𝟏 = {a,b}, 𝒂𝟐 ={} and agent 1 (the couple) pays 10.

15

10

10

31 of 44

A False-name Attack for the Example

  • Can agent 2 do better with a false-name attack? Bid:
  • b2({b}) = 0, b2({a}) = b2({a,b}) = 15
  • b3({a}) = 0, b3({b}) = b3({a,b}) = 15
  • VCG allocates 𝒂𝟏 = {}, 𝒂𝟐 ={𝒂} , 𝒂𝟑 = {𝒃} and agents 2 and 3 pay nothing

15

15

15

32 of 44

Is uncertainty the answer to the example?

  • What we showed is that with false-name attacks, VCG is no longer DSIC
  • But, false-name attacks’ success depends on other bidders’ valuations
  • What if the attacker is uncertain about the other bidders?

Left-hand, the attacker’s utility is -20. Right-hand, the attacker’s utility is 10

15

15

15

15

15

15

15

33 of 44

This Calls for a Bayesian Analysis… [Gafni, Lavi & Tennenholtz 2020]

 

34 of 44

Results…

 

35 of 44

  •  

Agent 1 / Agent 2

Action A

Action B

Action C

Action A

4, 8

3,9

6,17

Action B

2,6

10,5

9,5

Action C

5,10

3,7

5,9

What If There is No Bayesian Prior? [Gafni & Tennenholtz 2023]

36 of 44

Let’s apply ’Safety Level’ to the First-price Auction.

 

 

 

 

 

The worst-case performance of any under-bid (including exact-bid) is 0, when it does not win the item.

 

 

 

 

The worst-case performance of overbidding is negative, when it wins the item and pays more than its value.

37 of 44

A Refined Safety Notion

 

Agent 1 / Agent 2

Action A

Action B

Action C

Action A

4, 8

3,9

6,17

Action B

2,6

10,5

9,5

Action C

5,10

3,7

5,9

- How does it apply to the first-price auction?

38 of 44

Discrete First-price Auction with DSL

 

 

 

 

 

 

 

 

 

 

 

 

39 of 44

Discrete First-price Auction with DSL

 

 

 

 

 

 

 

 

 

 

 

 

40 of 44

Ok… and how about VCG under Sybil Attacks?

 

41 of 44

Exact-bidding Strategies can come in many forms

10

10

30

 

30

10

10

10

10

20

10

6

20

10

4

42 of 44

An Attacker Can Benefit From an Exact-Bidding Attack

10

10

15

 

15

10

10

5

5

20

5

5

43 of 44

44 of 44

Conclusion

  • We saw two models of VCG under uncertainty
  • If the attacker knows a distribution over the agents’ types, in many cases truthfulness is a BNE.
  • If the attacker doesn’t know a distribution, it is prudent to follow a DSL strategy.
  • But then, given DSL attackers, we are still guaranteed optimal welfare!

Future Work?

 

Bids:

3 rooms, 5000$ total

8 rooms, 10000$ total

1 room, 2000$ total